메뉴 건너뛰기




Volumn , Issue , 2003, Pages 27-34

A workload characterization of elliptic curve cryptography methods in embedded environments

Author keywords

[No Author keywords available]

Indexed keywords

ARM PROCESSOR; DIFFIE-HELLMAN KEY EXCHANGE; DIGITAL SIGNATURE ALGORITHMS; ELGAMAL; ELLIPTIC CURVE; ELLIPTIC CURVE CRYPTOGRAPHY; ELLIPTIC CURVE CRYPTOSYSTEMS; EMBEDDED DEVICE; EMBEDDED ENVIRONMENT; EXECUTION TIME; INTEL XSCALE ARCHITECTURE; KEY SIZES; MEMORY HIERARCHY; MEMORY SUBSYSTEMS; PUBLIC KEYS; PUBLIC-KEY CRYPTOSYSTEMS; SECURITY LEVEL; WORKLOAD CHARACTERIZATION;

EID: 77953567600     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1152923.1024299     Document Type: Conference Paper
Times cited : (13)

References (21)
  • 1
    • 0036469652 scopus 로고    scopus 로고
    • SimpleScalar: An Infrastructure for Computer System Modelling
    • Feb.
    • T. Austin, E. Larson, D. Ernst, "SimpleScalar: An Infrastructure for Computer System Modelling", IEEE Computer, Volume 35, Issue: 2, Feb. 2002, pp. 59-67.
    • (2002) IEEE Computer , vol.35 , Issue.2 , pp. 59-67
    • Austin, T.1    Larson, E.2    Ernst, D.3
  • 4
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • T. ElGamal, "A public key cryptosystem and a signature scheme based on discrete logarithms", IEEE Trans. on Information Theory, Vol. 31, 1985, pp. 469-472.
    • (1985) IEEE Trans. on Information Theory , vol.31 , pp. 469-472
    • Elgamal, T.1
  • 5
    • 84962855303 scopus 로고    scopus 로고
    • Workload Characterization of Elliptic Curve Cryptography and other Network Security Algorithms for Constrained Environments
    • A. M. Fiskiran, R. B. Lee, "Workload Characterization of Elliptic Curve Cryptography and other Network Security Algorithms for Constrained Environments", Proc. of 5th IEEE Workshop on Workload Characterization (WWC-5), Nov. 2002, pp. 127-137.
    • Proc. of 5th IEEE Workshop on Workload Characterization (WWC-5), Nov. 2002 , pp. 127-137
    • Fiskiran, A.M.1    Lee, R.B.2
  • 8
    • 0038670954 scopus 로고    scopus 로고
    • Software Implementation of Elliptic Curve Cryptography over Binary Fields
    • Springer-Verlag
    • D. Hankerson, J. Lopez, A. Menezes, "Software Implementation of Elliptic Curve Cryptography over Binary Fields", Proc. of CHES 2000 Conference, Springer-Verlag, 2000, pp. 1-24.
    • (2000) Proc. of CHES 2000 Conference , pp. 1-24
    • Hankerson, D.1    Lopez, J.2    Menezes, A.3
  • 15
    • 77953583478 scopus 로고    scopus 로고
    • Miracl big integer library Web site
    • Miracl big integer library Web site, http://indigo.ie/~mscott/
  • 16
    • 0003629991 scopus 로고
    • NIST, FIPS pub180-1
    • NIST, Secure Hash Standard, FIPS pub180-1, 1995.
    • (1995) Secure Hash Standard
  • 17
    • 0003508562 scopus 로고    scopus 로고
    • National Institute of Standards and Technology, FIPS pub186-2, Jan.
    • Digital Signature Standard, National Institute of Standards and Technology, FIPS pub186-2, Jan. 2000.
    • (2000) Digital Signature Standard
  • 20
    • 0003465202 scopus 로고    scopus 로고
    • Version 2.0 Tech. Report CS-TR-97-1342 University of Wisconsin-Madison, June
    • D. C. Burger, T. M. Austin, "The SimpleScalar Tool Set, Version 2.0", Tech. Report CS-TR-97-1342, University of Wisconsin-Madison, June 1997.
    • (1997) The SimpleScalar Tool Set
    • Burger, D.C.1    Austin, T.M.2
  • 21
    • 77953564172 scopus 로고    scopus 로고
    • SimpleScalar LLC, http://www.simplescalar.com


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.